1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marta [7]
2 years ago
13

What are source data entry devices​

Computers and Technology
1 answer:
matrenka [14]2 years ago
7 0

Answer:

<u><em>Source data entry devices are used for audio input, video input and to enter the source document directly to the computer. Source data entry devices do not require data to be typed-in, keyed-in or pointed to a particular location.</em></u>

Explanation:

You might be interested in
4. How can you select non-adjacent cells (i.e. cells that are not all together in one block)?
jek_recluse [69]

Answer:

You can select non contiguous cells by holding down the Ctrl key as you select, with the mouse.

4 0
3 years ago
Read 2 more answers
The second step when using the problem-solving process is to
adelina 88 [10]

Answer:

The second step, which is to analyze the problem, involves gathering information, sorting through relevant and irrelevant information, and evaluating the source of the problem.

Explanation:

5 0
3 years ago
Suddenly, though, just as the procedure was about to be relayed to the astronauts, the pressure . . . the temperature . . . drop
konstantin123 [22]

Answer:

D)to show that the situation was tense for everyone

Explanation:

got it right on edge

5 0
3 years ago
Read 2 more answers
Help pleaseeeeeeeeeeeee
viktelen [127]
By dragging its borders
7 0
2 years ago
Read 2 more answers
When a hardware or software interrupt occurs, the CPU calls________
Alja [10]

Answer:

Operating system

Explanation:

An interrupt is the signal sent to the processor that interrupts the current process. It may be generated by a hardware device or a software program.With each interrupt the CPU hardware does exactly the same thing, which is what enables operating systems to take control of the current user operation.

5 0
3 years ago
Other questions:
  • A(n) __________ employs a method called "tunneling" in which each packet from the sending computer is encapsulated within anothe
    8·1 answer
  • Match the job titles to the tasks
    11·2 answers
  • I need someone to help. This is the links I found and I'm going through the same thing. I live in small town where they think I'
    14·1 answer
  • Write a function that will alphabetize a string WITHOUT using the sort function :
    7·1 answer
  • The code below is supposed to display the name and score for the student with the highest score one time before the program ends
    12·1 answer
  • Green field country is planning to conduct a cricket match between two teams A and B. a large crowd is expected in the stadium a
    6·1 answer
  • Whats yall favv scary movie
    11·1 answer
  • If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folde
    11·1 answer
  • The term information technology was first used what year?
    15·2 answers
  • Please help I’ll give 10 points
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!